{"id":593,"date":"2026-04-14T11:56:40","date_gmt":"2026-04-14T11:56:40","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=593"},"modified":"2026-04-14T11:56:40","modified_gmt":"2026-04-14T11:56:40","slug":"mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=593","title":{"rendered":"Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSTMJQqqJsKQgPpv94bO9xAc_tQCEJXJrZGAEmCuyUghslqHdHDYmuVYqIVLGqMLi_ZuY_zEBoDdGDQRVAX0KyGq9QcuIzQ5LVbNLBnwUwW2R7IBg0gopxAI9ml44zJsKXEoc1ig8zRbVDBNK3B4LZRE0WljzIfwnSMHx8Mv1kWYTK5qnxOB1YYl_WNWMa\/s1700-e365\/android-malware.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A nascent Android remote access trojan\u00a0called <strong>Mirax<\/strong> has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on\u00a0Meta.<\/p>\n<p>\u00abMirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real time,\u00bb Italian online fraud prevention firm\u00a0Cleafy <a href=\"https:\/\/www.cleafy.com\/cleafy-labs\/mirax-a-new-android-rat-turning-infected-devices-into-potential-residential-proxy-nodes\">said<\/a>.<\/p>\n<p>\u00abBeyond traditional RAT behavior, Mirax enhances its operational value by turning infected devices\u00a0into <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-rise-of-residential-proxies-and-its-impact-on-cyber-risk-exposure-management\">residential proxy\u00a0nodes<\/a>. Leveraging SOCKS5 protocol support and Yamux multiplexing, it establishes persistent proxy channels that allow attackers to route their traffic through the victim&#8217;s real IP\u00a0address.\u00bb<\/p>\n<p>Details of\u00a0Mirax first\u00a0emerged last month when Outpost24&#8217;s KrakenLabs revealed that a threat actor going by the name \u00abMirax Bot\u00bb has been advertising a private malware-as-a-service (MaaS) offering on underground forums for $2,500 for a three-month subscription. Also\u00a0available for $1,750 per month is a lightweight variant that removes certain features like the proxy and the ability to bypass Google Play Protect using\u00a0a crypter.<\/p>\n<p>Like other Android malware, Mirax supports the ability to capture keystrokes, steal photos, gather lock screen details, run commands, navigate the user interface, and monitor user activity on the compromised device. It\u00a0can also dynamically fetch HTML overlay pages from a command-and-control (C2) server to be rendered over legitimate applications for credential\u00a0theft.<\/p>\n<p>The incorporation of a SOCKS proxy, on the other hand, is a relatively lesser-known feature that sets it apart from conventional RAT behavior. The\u00a0proxy botnet offers several advantages in that it allows threat actors to get around geolocation-based restrictions, evade fraud detection systems, and conduct account takeovers or transaction fraud under the guise of increased anonymity and legitimacy.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abUnlike typical MaaS offerings, Mirax is distributed through a highly controlled and exclusive model, limited to a small number of affiliates,\u00bb researchers Alberto Giust, Alessandro Strino, and Federico Valentini said. \u00abAccess appears to be prioritized for Russian-speaking actors with established reputations in underground communities, indicating a deliberate effort to maintain operational security and campaign effectiveness.\u00bb<\/p>\n<p>Attack chains distributing the malware use Meta ads to promote dropper app web pages, tricking unsuspecting users into downloading them. As\u00a0many as six ads have been\u00a0observed <a href=\"https:\/\/www.facebook.com\/ads\/library\/?active_status=active&amp;ad_type=all&amp;country=ALL&amp;is_targeted_country=false&amp;media_type=all&amp;q=streamtv%20esp&amp;search_type=keyword_unordered&amp;sort_data[direction]=desc&amp;sort_data[mode]=total_impressions\">actively advertising<\/a> a streaming service with free access to live sports and movies. Of\u00a0these, five ads are directed against users in Spain. One\u00a0of the ads, which started running on April 6, 2026, has a reach of 190,987\u00a0accounts.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhBkR4UJ91vHZLLbT1M6kFwQhnFKgbBcxLWKrXbRCyKa2az1tPf0C8KrgrLh2wGhKK8g60TsI_5T_HBL5AwdxSGYLlGDORY_duOknccekUD0a-Bhu9noyvpVo1sZ6OtGYyt4YGHqTTdjAhkq346Z_5IdOMvAxVv_I_qG4-S7CQTZdKKDhoXnYZlmu-p5ltA\/s1700-e365\/mobile.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhBkR4UJ91vHZLLbT1M6kFwQhnFKgbBcxLWKrXbRCyKa2az1tPf0C8KrgrLh2wGhKK8g60TsI_5T_HBL5AwdxSGYLlGDORY_duOknccekUD0a-Bhu9noyvpVo1sZ6OtGYyt4YGHqTTdjAhkq346Z_5IdOMvAxVv_I_qG4-S7CQTZdKKDhoXnYZlmu-p5ltA\/s1700-e365\/mobile.png\" alt=\"\" border=\"0\" data-original-height=\"1388\" data-original-width=\"1494\"\/><\/a><\/div>\n<p>The dropper app URLs implement a number of checks to ensure that they are accessed from mobile devices and to prevent automated scans from revealing their true color. The\u00a0names of the malicious apps are listed below\u00a0&#8211;<\/p>\n<ul>\n<li>StreamTV (org.lgvvfj.pluscqpuj or org.dawme.secure5ny) &#8211; Dropper app<\/li>\n<li>Reproductor de video (org.yjeiwd.plusdc71 or org.azgaw.managergst1d) &#8211; Mirax<\/li>\n<\/ul>\n<p>A notable aspect of the campaign is the use of GitHub to host the malicious dropper APK files. In\u00a0addition, the builder panel offers the ability to choose between two crypters \u2013 Virbox\u00a0and Golden\u00a0Crypt (aka Golden Encryption) \u2013 for enhanced APK protection.<\/p>\n<p>Once installed, the dropper instructs users to allow installation from unknown sources to deploy the malware. The\u00a0process of extracting the final payload is a \u00absophisticated, multi-stage operation\u00bb that&#8217;s designed to sidestep security analysis and automated sandboxing\u00a0tools.<\/p>\n<p>The malware, after getting installed on the device, masquerades as a video playback utility and prompts the victim to enable accessibility services, thereby allowing it to run in the background, display a fake error message stating the installation was unsuccessful, and serve bogus overlays to conceal malicious activities.<\/p>\n<p>It also establishes multiple bidirectional C2 channels for tasking and data exfiltration\u00a0&#8211;<\/p>\n<ul>\n<li>WebSocket on port 8443, to manage remote access and execute remote commands.<\/li>\n<li>WebSocket on port 8444, to manage remote streaming and data exfiltration.<\/li>\n<li>WebSocket on port 8445 (or a custom port), to set up the residential proxy using SOCKS5.<\/li>\n<\/ul>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abThis convergence of RAT and proxy capabilities reflects a broader shift in the threat landscape,\u00bb Cleafy said. \u00abWhile residential proxy abuse has historically been associated with compromised IoT devices and low-cost Android hardware such as smart TVs, Mirax marks a new phase by embedding this functionality within a full-featured banking\u00a0trojan.\u00bb<\/p>\n<p>\u00abThis approach not only increases the monetization potential of each infection but also expands the operational scope of attackers, who can now leverage compromised devices for both direct financial fraud and as infrastructure for wider cybercriminal activities.\u00bb<\/p>\n<p>The disclosure comes as Breakglass Intelligence detailed an Arabic-language Android RAT called ASO\u00a0RAT that&#8217;s distributed via apps disguised as PDF readers and Syrian government applications.<\/p>\n<p>\u00abThe platform provides full device compromise capabilities \u2013 SMS interception, camera access, GPS tracking, call logging, file exfiltration, and DDoS launching from victim devices,\u00bb the\u00a0company <a href=\"https:\/\/intel.breakglass.tech\/post\/aso-rat-arabic-android-surveillance-platform-syria\">said<\/a>. \u00abA multi-user panel with role-based access control suggests this operates as a RAT-as-a-Service or supports a multi-operator\u00a0team.\u00bb<\/p>\n<p>It&#8217;s\u00a0currently not\u00a0known what the exact end goals of the campaign\u00a0are, but Syria-themed lures for the apps (e.g., SyriaDefenseMap and GovLens)\u00a0suggest that it may be targeting individuals with an interest in Syrian military or governance matters as part of what&#8217;s suspected to be a surveillance operation.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A nascent Android remote access trojan\u00a0called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on\u00a0Meta.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":594,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[862,281,175,235,1210,1212,264,1213,1211,521],"class_list":["post-593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-ads","tag-android","tag-devices","tag-meta","tag-mirax","tag-proxies","tag-rat","tag-reaching","tag-socks5","tag-turns"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=593"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/593\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/594"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}